If I access the EE's "My data" page (sorta a mini "My account" page) on mobile, which doesn't require authentication, then visit the same page again via wifi, it'll "imprint" my mobile account details onto the wifi connection using a cookie. Thus, the cookie identifies my mobile account number so I can check my data allowance even when connected to WiFi

What appears to be happening now is someone else has done that on this public wifi hotspot, but instead of using the cookie to identify a mobile account it's basically done the reverse, and used the hotspot's IP to log me into the session he opened with his cookie, thus logging anyone on this public hotspot some previous user's account

Looking for program, tool, library or something that will inventory and build clickable web page of interesting folders in the filesystem. Where 'interesting' means there's a certain file in it with some metadata. E.g. Foobaz\.project and Project: Super Collider; Owner: Heracles; Date Initiated: 0500-12-02; etc... ... Anyone know of anything like this? Or just even where to go and talk about it?

It's automatically and silently assigning an IP to auto login to someone's account and overriding/ignoring actual login information and probably done so without the other person's knowledge or consent

Either that or the server's got a glitched session ID

Nope, it's using IP

Just checked with another device in incognito mode on the same public hotspot

Anyone on this public hotspot who goes to this mobile operator's website gets automatically logged into 07534 081 778's account. Who probably never even entered his login details while connected to this hotspot.

Among other things, CFast uses SATA, which means that CFast readers require little more than a bog-standard USB to SATA bridge. In fact, the connector is electrically compatible with SATA, requiring only a mechanical adapter, a hotswap-capable SATA port, and SATA power to implement internally on a PC.

My college administration is forcing us to install Cyberoam Firewall SSL certificate so that they can view all the encrypted traffic to "improve our security". If I don't install the certificate than I won't be able to use their network.
What are the ways I can protect my privacy in such a situa...

> research shows how replacement screens can be used to surreptitiously log keyboard input and patterns, install malicious apps, and take pictures and e-mail them to the attacker. The booby-trapped screens also exploited operating system vulnerabilities that bypassed key security protections built into the phones.

> The malicious parts cost less than $10 and could easily be mass-produced. Most chilling of all, to most people, the booby-trapped parts could be indistinguishable from legitimate ones.

> > The researchers' booby-trapped touchscreen, for instance, logs unlock patterns and keyboard input, takes pictures of the user and sends them to the attacker, replaces user-selected URLs with phishing URLs, and installs apps of the attacker's choice. A second class of attacks uses the chip to exploit vulnerabilities in the OS kernel. To keep the attack stealthy, the chip can also turn off power to the display panel while the uninitiated actions are performed

@AnimeshAshish I've done it. It is slow. It is laggy. And it won't work on all APs, just some, it's hit and miss.

The back of our UPS has a USB port so that it can be monitored from a server it supplies.
However this USB port doesn't appear to be one of the normal standard USB connectors. It looks a little like an RJ45 connector, I tried an ethernet cable in case the port was just mislabelled but that didn'...

I just bought a Samsung Galaxy On7 G600FY (o7lte) and I'm trying to root it.
When I try to root it using cf-autoauto-root, I get a Unsupport dev_type message on the device screen.
What I've done
Successfully flashed a custom TWRP recovery using Odin.
Backed up the whole system with TWRP.
Down...

Playing around with a possible new build for photo/video editing work, possibly with workstation cards and a server-style configuration.

Although I don't really do video, I'm looking into that possibility and might need better gear.

While Astaroth is capable of excellent performance in workstation applications, it wasn't designed for video editing. The storage configuration intended for hundreds of gigabytes or terabytes of video data, it doesn't use workstation graphics cards, and 8C/16T isn't quite enough for 4K work.

@bwDraco While Astaroth is capable of excellent performance in workstation applications, it wasn't designed for video editing. The storage configuration isn't intended for hundreds of gigabytes or terabytes of video data, it doesn't use workstation graphics cards, and 8C/16T isn't quite enough for 4K work. (source)

> In an elaborate overnight operation at the 2014 Sochi Games, a team assembled by Russia’s sports ministry tampered with more than 100 urine samples to conceal evidence of top athletes’ steroid use throughout the course of competition.

Question regarding OneNote: I have two documents inserted into a table, presently they're showing up stacked, so one document icon on one line, and the next document below it. They are in the same row in the table. Is it possible to put these documents side-by-side without altering the table?

My attempts either cause the documents to stack, or they go diagonal, almost like a float issue that I would see in CSS.